League of Legends Philippines Removes ‘Cryptojacking’ Code From Its Client

Published at: July 12, 2018

Security engineers of the Philippine community of major multiplayer video game League of Legends (LoL) have removed Coinhive crypto mining code from its Garena client June 11, according to an official statement from the group’s Facebook.

On July 9, Monero (XMR) mining malware Coinhive was first detected on the LoL client by a player who posted about the issue on the League of Legends subreddit.

According to the group’s Facebook statement, the recent case of Coinhive cryptojacking was caused by “unauthorized modification of the League of Legends PH client lobby where a certain javascript code was inserted.” Garena noted that apart “increased CPU usage,” the security experts found “no other impact on affected computers.”

Founded in 2009 in Singapore, Garena is a platform provider based in Asia. Garena offers gaming platforms for multiplayer online battle arena games League of Legends and Heroes of Newerth, as well as the online soccer game FIFA Online 3, and shooter games Point Blank and Alliance of Valiant Arms.

Cryptojacking malware activity has reportedly surged by 629 percent in the first quarter of 2018, with Monero mining Coinhive going epidemic on the Internet. However, the volumes of Monero generated from malicious cryptojacking amount to just around 5 percent.

On June 12, Japanese police started investigating a case of cryptojacking involving Monero-mining software Coinhive, which became the first criminal case involving cryptocurrency mining in Japan.

Subsequently, on June 16, Japanese prosecutors from 10 prefectures arrested 16 individuals suspected of involvement in an ongoing criminal case of cryptojacking, with the Sendai District Court eventually sentencing a 24-year old of the city of Amagasaki in Hyogo prefecture to one year in prison.

Tags
Related Posts
Botnet Exploits SQL Servers to Install Crypto Mining App
Recent reports revealed that a group of hackers behind the Kingminer botnet targeted vulnerable Microsoft SQL server databases to mine cryptocurrencies at some point in the second week of June. According to the cybersecurity firm Sophos, the attackers used the botnet, active since 2018, to exploit the BlueKeep and EternalBlue vulnerabilities, by also accessing through a trojan known as Gh0st, which relies on a remote access malware. Once the SQL server database is infected, the botnet installs a well-known crypto miner software called XMRig, which mines Monero (XMR). There are no details as of press time regarding how many systems …
Altcoin / June 10, 2020
1,000 Corporate Systems Infected With Monero Mining Malware
The Blue Mockingbird malware gang has infected more than 1,000 business systems with Monero mining malware since December 2019. The global scale of the hacker group’s operations was revealed by cloud security firm Red Canary on May 26. The report outlined the group’s methodology. The malware attacks servers running ASP.NET applications and exploits a vulnerability to install a web shell on the attacked computer and obtain administrator-level access to modify the server settings. Next, the cybercriminals install the XMRRig application to take advantage of the resources of the infected machines. Most of the infected computers belong to large companies, though …
Altcoin / May 27, 2020
Despite Bear Market, Crypto Mining Malware Tops Threat Index for 13th Month Running
Three strains of crypto mining malware have topped the latest Global Threat Index from Israeli cybersecurity firm Check Point, according to a press release published on Jan. 14. Check Point Software Technologies Ltd. is a security solution provider for governments and enterprises globally, with over 100,000 organizations reported to be currently using its security management system. As reported, stealth crypto mining attacks — also known as cryptojacking — work by installing malware that uses a computer’s processing power to mine for cryptocurrencies without the owner’s consent or knowledge. According to Check Point’s Global Threat Index for December 2018, the top …
Altcoin / Jan. 14, 2019
Mining Malware Continues To Dominate Cybersecurity Threats By Seeking Out New Vulnerabilities
Mining malware may now be painfully familiar to anyone with even a passing awareness of cryptocurrency, but so far businesses and consumers alike are failing to significantly curb its growing threat. On May 14, Israeli cybersecurity firm Check Point released its latest Global Threat Index, and for the fifth consecutive month it found that the Coinhive crypto-miner is the "most prevalent malware" in the world, affecting 16 percent of organizations globally. Meanwhile, Santa Clara-based Malwarebytes released its Cybercrime tactics and techniques: Q1 2018 report on April 9, finding that businesses had seen a 27 percent increase in mining malware in …
Altcoin / May 24, 2018
Coinhive Code Found On 300+ Websites Worldwide In Recent Cryptojacking Campaign
The Coinhive crypto mining code has been recently detected on more than 300 government and university websites worldwide, cyber security researcher Troy Mursch reported Saturday, May 5. According to the report, all the affected websites are using a vulnerable version of the Drupal content management system. As the researcher posted on Twitter May 4, he was alerted to this particular campaign via the attack on the websites of the San Diego Zoo, and the government of Chihuahua, Mexico. Both websites reportedly had Coinhive injected into their Javascript libraries in the same way. Coinhive is a JavaScript program created to mine …
United States / May 8, 2018